Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

2021

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Entire DC Network

Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic Dec 2021

Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic

Computer Science Faculty Publications and Presentations

Current trends in HPC, such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications, have created gaps that traditional performance tools do not cover. One example is Holistic HPC Workflows — HPC workflows comprising multiple codes, paradigms, or platforms that are not developed using a workflow management system. To diagnose the performance of these applications, we define a new metric called Workflow Critical Path (WCP), a data-oriented metric for Holistic HPC Workflows. WCP constructs graphs that span across the workflow codes and platforms, using data states as vertices and data mutations as edges. …


Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan Dec 2021

Sheridan Self, Timothy Jordan Catibog, Vivek Gupta, Syed Faaiz Rehan

Student Capstones

The purpose of this mobile app is to provide the Sheridan students, the tools and the personal space to design and map their own development process. This process is essential as it is used to set goals and improve efficiency and productivity to make students more agile and resilient and enable them to reevaluate their goals based on the data collected. The ideal solution is to create that virtual space to allow them to self-asses with daily/weekly reflections, then set goals accordingly to find relevant opportunities and resources. By providing this platform, students would generate their own data to monitor …


Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes Dec 2021

Studysnap, Liam A. Stickney, Malik Sheharyaar Talhat, Benjamin D. Sykes

Student Capstones

In today’s modern education world, there have been several emerging technologies that were created to expand the learning experience beyond the traditional pencil and paper. Such items include online planners and numerous online student resource websites, but some students may find that there are sometimes too many resources. With so many resources available to them, students may find it overwhelming and may not even know where to start when it comes time to study. StudySnap aims to solve the unorganized and cluttered nature of study time by combining a clean resource organization tool with a smart and automatic resource search …


Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy Dec 2021

Intelligent Resource Prediction For Hpc And Scientific Workflows, Benjamin Shealy

All Dissertations

Scientific workflows and high-performance computing (HPC) platforms are critically important to modern scientific research. In order to perform scientific experiments at scale, domain scientists must have knowledge and expertise in software and hardware systems that are highly complex and rapidly evolving. While computational expertise will be essential for domain scientists going forward, any tools or practices that reduce this burden for domain scientists will greatly increase the rate of scientific discoveries. One challenge that exists for domain scientists today is knowing the resource usage patterns of an application for the purpose of resource provisioning. A tool that accurately estimates these …


Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud Nov 2021

Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud

Earth and Environmental Sciences Faculty Publications

Knowledge of the groundwater potential, especially in an arid region, can play a major role in planning the sustainable management of groundwater resources. In this study, nine machine learning (ML) algorithms—namely, Artificial Neural Network (ANN), Decision Jungle (DJ), Averaged Perceptron (AP), Bayes Point Machine (BPM), Decision Forest (DF), Locally-Deep Support Vector Machine (LD-SVM), Boosted Decision Tree (BDT), Logistic Regression (LG), and Support Vector Machine (SVM)—were run on the Microsoft Azure cloud computing platform to model the groundwater potential. We investigated the relationship between 512 operating boreholes with a specified specific capacity and 14 groundwater-influencing occurrence factors. The unconfined aquifer in …


A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author Sep 2021

A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author

Library Philosophy and Practice (e-journal)

The purpose of this paper is to explore the possibility of introducing cloud architecture for public library system in areas where library automation is operational on a standalone server. It also proposes a cloud based model library management system to function on an affordable, robust architecture. The paper made an attempt to highlight the present status of library automation and networking among public libraries in West Bengal. It presents functional requirements for a SaaS based (Software as a Service) model. The simulation approach for the model architecture supports the possibility to connect all public libraries across different hierarchical tiers under …


Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli Sep 2021

Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli

Faculty Research, Scholarly, and Creative Activity

Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational efficiency. In order to match the performance needs, cloud computing engages with the perils of peer-to-peer (P2P) computing and brings up the P2P cloud systems as an extension for federated cloud. Having a decentralized architecture built on independent nodes and resources without any specific central control and monitoring, these cloud deployments are able to handle resource provisioning at a very low cost. Hence, we see a vast amount of mobile applications and services that are ready to scale to …


Application Research Of Static Security Analysis Cloud Computing Based On Docker Technology, Yang Liu, Ruifeng Zhao, Bo Li, Haizhu Wang, Dawei Deng Aug 2021

Application Research Of Static Security Analysis Cloud Computing Based On Docker Technology, Yang Liu, Ruifeng Zhao, Bo Li, Haizhu Wang, Dawei Deng

Journal of Electric Power Science and Technology

To match to the development of the concurrency and expansibility requirements of multiuser static security analysisin power dispatching systems, this paper analyzes the characteristics of static security analysis and calculation, and combines it with docker technology.Based on Docker technology, astatic security analysis cloud computing application method is proposed for designing the operation architecture of the application. In this method, Docker container images are generated corresponding to different power flow algorithms, and the data exchangebetween users and containers are realized by using Protobuf. New containers are dynamically created and idle containers is allocated according to the calculation request. Containerswill be released …


Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng Aug 2021

Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng

Research Collection School Of Computing and Information Systems

As a milestone in the development of outsourcing services, cloud computing enables an increasing number of individuals and enterprises to enjoy the most advanced services from outsourcing service providers. Because online payment and data security issues are involved in outsourcing services, the mutual distrust between users and service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing solutions only consider a specific type of services and rely on a trusted third-party to realize fair payment. In this paper, to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or …


Tess As A Low-Surface-Brightness Observatory: Cutouts From Wide-Area Coadded Images, G. Bruce Berriman, John C. Good, Benne Holwerda Jul 2021

Tess As A Low-Surface-Brightness Observatory: Cutouts From Wide-Area Coadded Images, G. Bruce Berriman, John C. Good, Benne Holwerda

Faculty Scholarship

We present a mosaic of those co-added Full Frame Images acquired by the TESS satellite that had been released in 2020 April. The mosaic shows substantial stray light over the sky. Yet over spatial scales of a few degrees, the background appears uniform. This result indicates that TESS has considerable potential as a Low Surface Brightness Observatory. The co-added images are freely available as a High Level Science Product (HLSP) at MAST and accessible through a Jupyter Notebook.


Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A Jun 2021

Web Services In Cloud Computing Research: Insights From Scientometric, Sivankalai S, Virumandi A

Library Philosophy and Practice (e-journal)

The research is the outcome of the investigation of 4035 papers on web services and cloud study, as covered in the Web of Knowledge core collection database during 2010 - 2019, going through an overall group author contribution of 29.00% during the period, Iosup, Alexandru, et al with a citation impact per paper of 44.10% and a journal impact per paper of 5.768 by Future generation computer systems-the international journal of science. The world's web services and cloud research output is diverse, with the top three open access research journals accounting for 66.59% (All Open Access 44.03%, DOAJ Gold 17.41%, …


Energy-Efficient Load Balancing Algorithm For Workflow Scheduling In Cloud Data Centers Using Queuing And Thresholds, Nimra Malik, Muhammad Sardaraz, Muhammad Tahir, Babar Shah, Gohar Ali, Fernando Moreira Jun 2021

Energy-Efficient Load Balancing Algorithm For Workflow Scheduling In Cloud Data Centers Using Queuing And Thresholds, Nimra Malik, Muhammad Sardaraz, Muhammad Tahir, Babar Shah, Gohar Ali, Fernando Moreira

All Works

Cloud computing is a rapidly growing technology that has been implemented in various fields in recent years, such as business, research, industry, and computing. Cloud computing provides different services over the internet, thus eliminating the need for personalized hardware and other resources. Cloud computing environments face some challenges in terms of resource utilization, energy efficiency, heterogeneous resources, etc. Tasks scheduling and virtual machines (VMs) are used as consolidation techniques in order to tackle these issues. Tasks scheduling has been extensively studied in the literature. The problem has been studied with different parameters and objectives. In this article, we address the …


Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob Jun 2021

Efficient Attribute-Based Encryption With Repeated Attributes Optimization, Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob

Research Collection School Of Computing and Information Systems

Internet of Things (IoT) is an integration of various technologies to provide technological enhancements. To enforce access control on low power operated battery constrained devices is a challenging issue in IoT scenarios. Attribute-based encryption (ABE) has emerged as an access control mechanism to allow users to encrypt and decrypt data based on an attributes policy. However, to accommodate the expressiveness of policy for practical application scenarios, attributes may be repeated in a policy. For certain policies, the attributes repetition cannot be avoided even after applying the boolean optimization techniques to attain an equivalent smaller length boolean formula. For such policies, …


Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr. Jun 2021

Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.

Library Philosophy and Practice (e-journal)

Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …


How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach May 2021

How The Growth Of Technology Has Forced Accounting Firms To Put An Emphasis On Cybersecurity, Holden Halbach

Accounting Undergraduate Honors Theses

The advancement of technology has brought many changes to accounting firms. Computer applications such as Microsoft Excel have made calculators and physical spreadsheets obsolete. Then with the introduction of cloud computing employees can store, access, and exchange large amounts of data instantaneously from any location. These technological innovations have increased the accuracy and efficiency of firms substantially. However, this growth in technology has shown the importance of putting an emphasis on cybersecurity throughout the accounting industry. The emphasis placed on cybersecurity throughout accounting firms is more prevalent than any other industry. This is primarily because accounting firms not only deal …


Parallel Clustering Analysis For Power Consumption Data Based On Graph Model, Peng Tao, Yangrui Zhang, Mengyu Li, Jielin Li Apr 2021

Parallel Clustering Analysis For Power Consumption Data Based On Graph Model, Peng Tao, Yangrui Zhang, Mengyu Li, Jielin Li

Journal of Electric Power Science and Technology

As the deepen development of smart grids construction, more and more monitoring data are collected in power distribution network, and gradually forming big data on the user side of smart grids. The traditional data analysis model does no longer meet performance requirements of huge data processing. Thereby new storage and data analysis models are urgently needed to be established. Under this background, this paper proposes a cluster analysis method for massive electricity consumption data based on the Alibaba Cloud big data analysis platform MaxCompute. The characteristics of power consumption data are fully considered, and a multilevel partition tablebased power consumption …


Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami Apr 2021

Towards A Federated Identity And Access Management Across Universities, Jameel Alsulami

Doctoral Dissertations and Master's Theses

Many research projects are too complex to yield the efforts of a single investigator and require a coordinated effort from interdisciplinary research teams across universities and industries. The research data, documents, experimental testbeds, high-end computing equipment, etc. is a critical component of any large-scale project and hence the cooperation and resource sharing across universities become very important for timely and budget-friendly execution of these projects. However, it is extremely challenging to frequently and effectively access data and other resources across universities without creating new identities for the users. In this thesis, we propose Federated Identity Management (FIM) approach for facilitating …


Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu Mar 2021

Enabling Distributed Applications Optimization In Cloud Environment, Pinchao Liu

FIU Electronic Theses and Dissertations

The past few years have seen dramatic growth in the popularity of public clouds, such as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Container-as-a-Service (CaaS). In both commercial and scientific fields, quick environment setup and application deployment become a mandatory requirement. As a result, more and more organizations choose cloud environments instead of setting up the environment by themselves from scratch. The cloud computing resources such as server engines, orchestration, and the underlying server resources are served to the users as a service from a cloud provider. Most of the applications that run in public clouds are the distributed applications, also called …


A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R. Mar 2021

A Bibliometric Analysis Of Authentication Based Access Control In Cloud Using Blockchain, Yogesh Gajmal, Udayakumar R.

Library Philosophy and Practice (e-journal)

Access Control is mentioned to as the imprisonment of particular activities of an individual to carry out an action. Cloud storing similar to any other untrusted surroundings wants the capacity to protect the shared data. The one of the apparatus of access mechanism is ciphertext-policy attribute-based encryption system over and done with dynamic characteristics. With a blockchain based distributed ledger, the scheme offers immutable log of whole significant safety events, for example key generation, change or revocation, access policy assignment, access request etc. Number of different problems similar to single point of failure, security and privacy etc. were targeted through …


Quantitative Analysis And Performance Evaluation Of Target-Oriented Replication Strategies In Cloud Computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, Amril Nazir Mar 2021

Quantitative Analysis And Performance Evaluation Of Target-Oriented Replication Strategies In Cloud Computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, Amril Nazir

All Works

Data replications effectively replicate the same data to various multiple locations to accomplish the objective of zero loss of information in case of failures without any downtown. Dynamic data replication strategies (providing run time location of replicas) in clouds should optimize the key performance indicator parameters, like response time, reliability, availability, scalability, cost, availability, performance, etc. To fulfill these objectives, various state-of-the-art dynamic data replication strategies has been proposed, based on several criteria and reported in the literature along with advantages and disadvantages. This paper provides a quantitative analysis and performance evaluation of target-oriented replication strategies based on target objectives. …


Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng Mar 2021

Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng

Research Collection School Of Computing and Information Systems

Encrypted data deduplication, along with different preferences in data access control, brings the birth of hybrid encrypted cloud data deduplication (H-DEDU for short). However, whether H-DEDU can be successfully deployed in practice has not been seriously investigated. Obviously, the adoption of H-DEDU depends on whether it can bring economic benefits to all stakeholders. But existing economic models of cloud storage fail to support H-DEDU due to complicated interactions among stakeholders. In this article, we establish a formal economic model of H-DEDU by formulating the utilities of all involved stakeholders, i.e., data holders, data owners, and Cloud Storage Providers (CSPs). Then, …


The Extent Of Application Of The General Rules For The Protection Of Intellectual Works Stored Through Cloud Computing: A Study In Uae Legislation, Alaa Khasawneh Jan 2021

The Extent Of Application Of The General Rules For The Protection Of Intellectual Works Stored Through Cloud Computing: A Study In Uae Legislation, Alaa Khasawneh

UAEU Law Journal

This research focuses on the most important legal problems raised by cloud computing services and its applications, especially the protection of content stored through these applications. Some legislations have organized these risks with special laws relating to personal data. The study concluded that the Emirati legislator should trait the legal aspects of cloud computing and create its own legal framework.

Keywords: Cloud computing, intellectual property, terms of service.


Awareness And Adoption Of Cloud Computing In Nigerian Libraries: An Aid To Library Services, Aishatu Nya Zubairu Miss, John Olugbenga Akiola Mr, Saheed Abiola Hamzat Ph.D Jan 2021

Awareness And Adoption Of Cloud Computing In Nigerian Libraries: An Aid To Library Services, Aishatu Nya Zubairu Miss, John Olugbenga Akiola Mr, Saheed Abiola Hamzat Ph.D

Library Philosophy and Practice (e-journal)

Abstract

The study focused on awareness and adoption of cloud computing in Nigerian libraries. Given the importance of cloud computing to information resources storage and service delivery, it has become necessary to find out the extent of awareness among library personnel and to ascertain what they use it for, either for personnel or professional use and as well the area to which cloud based services has been adopted in some selected Private Universities in Osun State. A survey design was adopted for this study. Fifty-three library personnel from four private university libraries constitutes the respondent for the study. These respondents …


Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran Jan 2021

Research Framework Of Human Factors Interactions With Technical And Security Factors In Cloud Computing, Hongjiang Xu, Sakthi Mahenthiran

Scholarship and Professional Work - Business

There are many advantages to adopt cloud computing, however, some important issues need to be addressed, such as cybersecurity, cost-saving, trust, implementation complexity, and cloud provider’s reliability. This study developed a research framework to study the human factors that interact with technical and cybersecurity factors to affect the cloud-computing provider’s performance from the user’s perspective. Research hypotheses were developed and a survey was conducted to test the hypotheses and validate the research framework.


A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu Jan 2021

A Survey Of Enabling Technologies For Smart Communities, Amna Iqbal, Stephan Olariu

Computer Science Faculty Publications

In 2016, the Japanese Government publicized an initiative and a call to action for the implementation of a "Super Smart Society" announced as Society 5.0. The stated goal of Society 5.0 is to meet the various needs of the members of society through the provisioning of goods and services to those who require them, when they are required and in the amount required, thus enabling the citizens to live an active and comfortable life. In spite of its genuine appeal, details of a feasible path to Society 5.0 are conspicuously missing. The first main goal of this survey is to …


Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley Jan 2021

Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley

Walden Dissertations and Doctoral Studies

Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …


The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ Jan 2021

The Relationship Between Technology Adoption Determinants And The Intention To Use Software-Defined Networking, Wendell Russ

Walden Dissertations and Doctoral Studies

AbstractThe advent of distributed cloud computing and the exponential growth and demands of the internet of things and big data have strained traditional network technologies' capabilities and have given rise to software-defined networking's (SDN's) revolutionary approach. Some information technology (IT) cloud services leaders who do not intend to adopt SDN technology may be unable to meet increasing performance and flexibility demands and may risk financial loss compared to those who adopt SDN technology. Grounded in the unified theory of acceptance and use of technology (UTAUT), the purpose of this quantitative correlational study was to examine the relationship between IT cloud …


A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai Jan 2021

A Tiered Recommender System For Cost-Effective Cloud Instance Selection, Xusheng Ai

University of the Pacific Theses and Dissertations

Cloud computing has greatly impacted the scientific community and the end users. By leveraging cloud computing, small research institutions and undergraduate colleges are able to alleviate costs and achieve research goals without purchasing and maintaining all the hardware and software. In addition, cloud computing allows researchers to access resources as their teams require and allows real-time collaboration with team members across the globe. Nowadays however, users are easily overwhelmed by the wide range of cloud servers and instances. Due to differences between the cloud server platforms and between instances within the platform, users find it difficult to identify the right …


A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan Jan 2021

A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan

Turkish Journal of Electrical Engineering and Computer Sciences

High impact scientific applications processed in distributed data centers often involve big data. To avoid the intolerable delays due to huge data movements across data centers during processing, the concept of moving tasks to data was introduced in the last decade. Even after the realization of this concept termed as data locality, the expected quality of service was not achieved. Later, data colocality was introduced where data groupings were identified and then data chunks were placed wisely. However, the aspect of the expected data traffic during run time is generally not considered while placing data. To identify the expected data …


Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga Jan 2021

Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga

Turkish Journal of Electrical Engineering and Computer Sciences

One of the major security challenges in cloud computing is distributed denial of service (DDoS) attacks. In these attacks, multiple nodes are used to attack the cloud by sending huge traffic. This results in the unavailability of cloud services to legitimate users. In this research paper, a hybrid machine learning-based technique has been proposed to detect these attacks. The proposed technique is implemented by combining the extreme learning machine (ELM) model and the blackhole optimization algorithm. Various experiments have been performed with the help of four benchmark datasets namely, NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, to evaluate the …